This website uses cookies to ensure you have the best experience. Learn more

Computer Crimes Essay

1101 words - 4 pages

Computer Crimes
Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future.
Criminal activity where a computer or network is the source, target, place or tool of a crime is what we call computer crime. Some other terms for computer crime are cybercime, e-crime, hi-tech crime, and electronic crime. None of these categories are exclusive and many activities can be characterized as falling in one or more category. Even though it states that the computer crime is when something takes place when the computer or network is a necessary part of the crime, there are some terms that are used to include traditional crimes. Some of the traditional crimes are fraud, theft, blackmail, forgery, and embezzlement when the computers or networks are used to facilitate the illicit activity.
There are a lot of different criminal activities that can be considered computer crime. Some examples of these activities are misuse of devices, forgery (theft id), electronic fraud, illegal access (unauthorized access), Trojan horses, cyberterrorism, email abuse/harassment, and data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data) are just a few. Forgery is a computer crime that can be perpetrated using the hardware components of the computer without the usage of the internet. For example, using Microsoft Word to type my signature when I did not actually right it and neither did you but it is still a computer crime that you committed. A Trojan horse is when a seemlingly harmless item enters the computer, it could be through in the form of an email attachment, it could come through a router with an open port, etc. However, it releases codes that causes the computer to do whatever is written in the code. Cyberterroism is terrorism done using the computer in some sort of way. Email abuse/harassment is when people use the computer to harass you whereas prior to the computer it was done via regular mail.
The growth of computer crime rapidly started in the 1970’s. Although a lot of people don’t see it, it is becoming into a problem which involves and has influences on nearly every aspect of our modern society. Due to the influence of computer crime, it has definetly changed the political, economocial, cultural and also military aspects of our society.
There are a lot of crimes that are easier to commit when using a computer. Examples of the easy to commit crimes are fraud, false inputting, fake output, forgery, theft of information, and eavesdropping. These are just a few although there are more out there.
Some of the manipulation of computers include data files, attack on hardware, theft of software, comprised measuring devices, hacking by both employees...

Find Another Essay On Computer Crimes

Computer Crimes Reflected through Television Programs

848 words - 4 pages Cybercrimes is a culture which has facilitated technological criminal efforts to undermine government and private organizations in order to create disruption and panic on a large scale. Today’s television programming incorporates a series of espionage type action roles, which demonstrate the impact of post 9/11 computer crimes which has increased nationwide fears. The television series 24 is an action drama featuring a make belief personality

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal valuable information from an employer.Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within

THE COMPUTER CRIMINAL - Computer crimes and a brief story of Kevin David Mitnick. Include details of his parole and intermediate punishment sentence. Fully cited. Includes references

4223 words - 17 pages offender. Still, he managed to cope with being surrounded by youths who were not at all like himself. He participated in prison programs and eventually assisted the prison as he developed a computer program that the state could use to track fellow delinquent youths. Also, Mitnick assisted the Los Angeles Police Department in putting together instructional videotape on computer crimes and computer security. Following his release in 1983 it seemed as if

Decoy Systems for Computer Crimes: Honeypots

1240 words - 5 pages In a world of computer crime, stolen identities, and network sabotage it would seem that hackers are the ones with the advantage with the rest of us playing the defensive. There are a number of tools that we use to fight back, such as: Anti-virus applications, firewalls, and encryption. These are some of the most well-known defensive strategies but there also exist one that actually encourages attacks, and is commonly called a honeypot. If you

The Role of Federal Agencies in Fighting Digital Crime

834 words - 4 pages The Secret Service, FBI, Department of Homeland Security, and other law enforcement agencies have similar challenges when fighting computer crimes and terrorism due to the recent development of computer technologies as well as constant threats. Federal law enforcement agencies and local law enforcement agencies have different responsibilities that work independently instead of on the same level, which can make it difficult to coordinate and

Cyber Crimes Reflected Through Television Programs

1058 words - 5 pages Cyber Crimes Reflected Through Television Programs Cybercrimes are a culture which has facilitated technological criminal efforts to undermine government and private organizations in order to create disruption and panic on a large scale. Today’s television programming takes a series of intelligence type action roles, which prove the impact of post 9/11. Computer crimes have increased nationwide fears. The television series 24 is an action drama

Computer Forensics and Criminal Justice

745 words - 3 pages A good and clear understanding of the relationship between the criminal justice system and computer crimes is a key factor in the investigation of those crimes. It is important for the investigator to know how to work his/her investigation within the system and not to overlook an element that might hinder or terminate the investigation. Paying attention to the criminal justice system when, dealing with computer crimes results in success in

Research

1165 words - 5 pages many people want changes to the CFAA today. The CFAA was made to cover the majority of computer crimes. The Computer Fraud and Abuse Act was created because the United States Secret Service, and other government agencies needed a law to allow them to investigate cyber-crimes. The United States government also needed a way to discourage and stop people from hacking, accessing data, and many other internet crimes from a government computer. With

Computer Viruses

732 words - 3 pages multiple copies of it and sent those copies from the victim’s computer, thus jam disk drives and the internet with multiple copies of the worm. Releasing such a worm into the Internet will slow the valid traffic on the internet. In the same way, many crimes involving computers are no different from crimes without computers; the computer is only a tool that a criminal uses to commit a crime. For example, using a computer or a scanner, you can

Computer Ethics Awareness Among University Students

930 words - 4 pages University. Other graduate students are excluded from the study. These group of students were chosen because they are readily accessible by the researcher and due to limited time that is available for the conduct of the study. The scope of the study is limited to computer crimes aspect of computer ethics.

Computer Crime, discusses the proposition that computer crime has increased dramatically over the last 10 years

1387 words - 6 pages program capable of altering or erasing computer memory) is introduced into a computer system.As subjects of crime, computers represent the electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators' accounts for withdrawal. Computers are instruments of crime when they are used to plan or control such criminal acts. Examples of these types of crimes are complex

Similar Essays

Computer Crimes Essay

779 words - 3 pages The computer has evolved a great deal since its creation over a third of a century ago. The uses of the computer now seem endless. Unfortunately some of those uses include computer crimes. This paper will explore some recent crimes that have occurred and the laws that apply to them.The first such incident took place in Russia between June and October 1994. Six people were arrested in the scheme, in which $10 million was allegedly shifted from

Computer Crimes Speech

664 words - 3 pages Computer crimes are on the rise 1 in 10 Americans experience some form of a malicious attack on their computer system. If you pay attention to the rest of this speech you will understand how a Hackers mind works and how to defend yourself from them. In this speech I will tell you why and how people break into computers, what sorts of trouble they cause, and what kind of punishment lie ahead for them if caught.Hackers and Crackers break into

Categories Of Computer Crimes Essay

1277 words - 5 pages instrument of a crime, computers as incidental to crime, and crimes associated with the prevalence of computers.The first computer crime category is computers as the target. During this crime, the attacker attempts to deny a computer's authorized user and/or owner from services which the user would typically freely have access to. Another aspect of this crime category is when a cyber criminal alters data the computer's owner feels is privately

Computer Crimes: Computers As Targets Essay

747 words - 3 pages theft, cyber-extortion and cyberharassment. We also realized that just because you think it is justified doesn’t mean it really is. An offender really needs to know that his justification is right before committing his crimes. Works Cited Britz, Marjie T. (2009) Computer Forensics and Cyber Crime: An Introduction. (2nd ed.) Upper Saddle River, NJ; Prentice Hall